Zeljka Zorz
![medical devices](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/11091922/medical_devices_gradient-400x200.jpg)
How to build up cybersecurity for medical devices
Manufacturing medical devices with cybersecurity firmly in mind is an endeavor that, according to Christopher Gates, an increasing number of manufacturers is trying to get …
![HP](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/07145047/hp-black-logo-400x200.jpg)
HP Device Manager vulnerabilities may allow full system takeover
Three vulnerabilities affecting HP Device Manager, an application for remote management of HP Thin Client devices, could be chained together to achieve unauthenticated remote …
![Google Chrome](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/07125605/google_chrome-security-white-400x200.jpg)
Chrome 86 delivers more security features for mobile users
Google has released Chrome 86 for desktop and mobile, which comes with several new and improved security features for mobile users, including: New password protections …
![AWS](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093159/aws1-400x200.jpg)
AWS adds new S3 security and access control features
Amazon Web Services (AWS) has made available three new S3 (Simple Storage Service) security and access control features: Object Ownership Bucket Owner Condition Copy API via …
![Google Security](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/22143734/google_security-400x200.jpg)
Google aims to improve security of browser engines, third-party Android devices and apps on Google Play
Google has announced two new security initiatives: one is aimed at helping bug hunters improve the security of various browsers’ JavaScript engines, the other at helping …
![nmap](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110432/nmap-400x200.jpg)
Nmap 7.90 released: New fingerprints, NSE scripts, and Npcap 1.0.0
Over a year has passed since Nmap had last been updated, but this weekend Gordon “Fyodor” Lyon announced Nmap 7.90. About Nmap Nmap is a widely used free and …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093404/money-400x200.jpg)
Companies that facilitate ransomware payments risk violating US sanctions
Companies that ransomware-hit US organizations hire to facilitate the paying of the ransom are at risk of breaking US sanctions, falling afoul of the US Department of the …
![NVIDIA](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/01131935/nvidia-logo-400x200.jpg)
Use an NVIDIA GPU? Check whether you need security updates
NVIDIA has released security updates for the NVIDIA GPU Display Driver and the NVIDIA Virtual GPU Manager that fix a variety of serious vulnerabilities. The driver security …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13142728/bomb-clock-time-400x200.jpg)
The biggest cyber threats organizations deal with today
Microsoft has released a new report outlining enterprise cyberattack trends in the past year (July 2019 – June 2020) and offering advice on how organizations can protect …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/31120744/healthcare-pills-attack-400x200.jpg)
Large US hospital chain hobbled by Ryuk ransomware
US-based healtchare giant Universal Health Services (UHS) has suffered a cyberattack on Sunday morning, which resulted in the IT network across its facilities to be shut down. …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093732/phishing2-400x200.jpg)
Phishers are targeting employees with fake GDPR compliance reminders
Phishers are using a bogus GDPR compliance reminder to trick recipients – employees of businesses across several industry verticals – into handing over their email …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
NIST guide to help orgs recover from ransomware, other data integrity attacks
The National Institute of Standards and Technology (NIST) has published a cybersecurity practice guide enterprises can use to recover from data integrity attacks, i.e., …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?